Internet Chapter 6
classless routing system
(CIDR) a notation system that allows network administrators to expand the number of network nodes assigned to an IP address.
war driving
(LAN jacking) the act of driving around with a laptop, antenna, and wireless card, looking for unsecured wireless networks to access.
network card
(NIC) an internal expansion card that enables a computer or other device to access a network.
network interface card (NIC)
(network card) an internal expansion card that enables a computer or other device to access a network.
LAN jacking
(war driving) the act of driving around with a laptop, antenna, and wireless card, looking for unsecured wireless networks to access.
network firewall
a combination of hardware and software that filters traffic between private networks or between a private network and a public network such as the internet.
routing table
a data table stored on the router or on a network computer that includes a list of routes to network addresses.
gateway
a hardware device or software that runs on a mainframe computer, a server, an individual workstation, or a router.
resolving
a hierarchy of servers used to translate domain names into IP addresses in a process called resolving the domain name.
token ring
a network that passes tokens clockwise in a circle from node to node.
Classless Inter-Domain Routing (CIDR)
a notation system that allows network administrators to expand the number of network nodes assigned to an IP address.
internet exchange point (IXP)
a physical infrastructure that enables ISPs to communicate among their networks, which limits the upstream traffic and ISP must handle.
smart card
a plastic card the size of a credit card, contains memory chips that can store special access codes or biometric information.
transceiver
a single component that both sends and receives transmissions.
Metropolitan Area Exchange (MAE)
a specific type of IXP; provides a high-speed Ethernet connection within a metropolitan area.
MAC (Media Access Control) address
a unique physical address.
tracert utility
a utility that you can use to trace hops from your computer to another computer over the internet. this is the Windows version.
virtual conversation
a video chat using services such as FaceTime.
web conferencing
a virtual meeting conducted using a browser and the web.
hijacking
a website occurs when hackers redirect a URL to an alternate website
location-based service (LBS)
a wireless service offered to customers based on their physical location
dynamic routing
allows a router to determine the best route between two nodes automatically and stores this information in a routing table.
virtual meeting
allows collaboration between participants, such as a group of employees by allowing invitees to log onto their network and sign in to a meeting .
Bluetooth
an example of short-range RF technology that sends and receives wireless transmissions between devices such as computers, smartphones, tablets, headsets, and more.
video conferencing
an expanded virtual meeting that sometimes includes hundreds or thousands of participants.
hub
an inexpensive hardware device used to connect multiple nodes on the same network.
bridge
an intelligent connectivity device with one input port and one output port that connects two segments on the same LAN or two separate LANs.
data switch
an intelligent device that also interprets MAC address and filters and forwards packets to other network segments.
router
an intelligent device with multiple ports.
port
an opening in a device that connects it to another device.
IP network
another name for a network running TCP/IP.
transmission media
are the communication media - physical or wireless - used to carry these transmissions.
classful routing system
assigned IP addresses by classifying networks as Class A through Class E to maximize the number of available IP addresses for each network.
distributed denial of services (DDos)
attacks, involve sending a continuous stream of server requests that ultimately overload a server's capacity to respond
intelligent hub
can perform a variety of tasks, such as filtering data or permitting a network administrator to monitor hub traffic.
passive hub
cannot determine how to direct a packet; it simply sends the same signal to all its connected nodes or segments.
private peering
connections to each others networks; enable internet traffic to bypass congested public peering points.
metropolitan area network (MAN)
connects clients and servers in a region that is larger than a single office or building.
coaxial cable
consists of a single copper wire surrounded by insulating material, woven or braided material, and a plastic outer covering.
peer-to-peer LAN
consists of a small number of computers and devices (generally 10 or fewer) linked together.
DNS namespace
consists of all of the information in the DNS databases, including the top-level domain, country code top-level domain, domain name, and IP address information.
twisted-pair cable
consists of insulated copper wires twisted around each other in pairs and then enclosed in a plastic material.
client/server network
consists of multiple computers and devices or workstations (clients), one or more servers, and other devices such as printers.
authoritative servers
contain the IP information for the TLD and ccTLD domains and their registrants.
fiber-optic cable
contains glass fibers surrounded by a layer of glass cladding and a protective outer jacket, is used to carry voice, video, and data transmissions over very long distances.
disaster recovery plan
covers how an organization deals with a natural or man-made disaster to ensure the organization's viability.
rogue WLAN
created by installing a wireless router that uses network resources and exposes the network to security threats.
octet
each 8-bit number in the IP address.
node
each computer or another device on a LAN. communicate with each other with cables or wireless media such as radio waves.
logical address
each node on an IP network also has a logical address, called an IP address,
accredited registrars
ensure that an organization's unique domain name appears on the appropriate DNS servers for a small annual fee.
wireless personal area networks (WPANs)
have a range approximately 33 feet or less. (use Bluetooth)
cloud storage
involves saving files and data to a folder on the cloud, rather than on a computer hard drive.
biometrics
involves using devices to measure biological data to identify a user.
body area network (BAN)
is a set of devices that function as a network on a human body.
root zone file
lists the addresses of all the TLD and ccTLD (country code top-level domain) DNS servers.
converged network
modern networks.
segments
multiple groups of computers or devices that share a common function.
wide area network (WAN)
network covering a very wide geographical area - can be a single network or multiple connected LANs located across the country or around the world.
hop
occurs when a packet travels to the next internet router.
caching servers
operated by ISPs and company IT departments containing stored domain name and IP address information developed from previous domain name resolution inquiries.
network service providers (NSPs)
provide the public and private network infrastructure for the internet that enables wireless, cellular, and other capabilities.
root name servers
publish a directory of the next level DNS servers, called the root zone file.
social engineering
relies on a network user divulging his or her username or password to someone, or allowing someone to enter a network facilities room without the proper authorization.
static routing
routes packets over specific paths between nodes.
global positioning system (GPS)
satellite network and receivers mounted in automobiles or placed in mobile phones, watches, tablets, or other handheld devices.
tokens
small packets of data.
access method
specifies how data travels from node to node across the network.
geosocial networking
term used to describe the combination of LBS with social networking providers.
throughput
the amount of data that can travel from one node to another node in a specified amount of time.
physical topology
the arrangement of computers and mobile devices, printers, and other devices.
IPv6
the current IP standard; lengthens IP addresses from 32 bits to 128 bits and thus increases the number of available IP addresses from the IPv4 standard, which is replaced.
peering
the exchange of internet traffic and router information between NSPs and ISPs at an exchange point, such as an IXP.
shared registration system (SRS)
the registration system that allows private companies to handle the registration of domain names.
TCP/IP stack
the set of standard internet protocols on which communications across the internet and many private networks rely.
logical topology
the way in which data travels between nodes.
cellular transmissions
travel wirelessly over land cells, using transceivers, or cell sites.
radio frequency (RF) transmissions
use broadcast radio waves to transmit data over short distances, such as between two smartphones.
Infrared (IR) transmissions
use infrared light signals as a short-range transmission medium between computers and devices equipped with infrared ports.
near field communication (NFC) transmission
use radio waves to connect devices that are touching or nearby (usually within 10 cm).
network operating system
used by a client/server LAN to manage data storage, printer access, communications, Internet connections, security, and network administration.
IP telephony
uses TCP/IP and packet switching to send voice transmissions over a private or public IP network.
Voice over IP (VoIP)
uses TCP/IP and packet switching to send voice transmissions over a private or public IP network.
Wi-Fi network
uses a wireless medium - such as radio frequency transmissions - to connect computers and mobile devices, printers, and other devices.
wireless LAN (WLAN)
uses a wireless medium - such as radio frequency transmissions - to connect computers and mobile devices, printers, and other devices.
spoofing
when a hacker accesses a network to set up a fake website or send mail that looks like it is coming from an internal server.
pair
you must pair devices for them to work together with Bluetooth. pairing devices typically requires modifying the device's settings, and can require a device ID or other information to complete the pairing.